1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yaroslaw [1]
3 years ago
15

Someone say crackhead

Computers and Technology
2 answers:
Ghella [55]3 years ago
6 0

Answer:

................. crackhead

sveticcg [70]3 years ago
5 0
.........……;Crack head
You might be interested in
Susie works for an architectural firm and the partners have always drawn the plans for projects by hand. Though Susie learned ho
Nookie1986 [14]

Answer:

A. CAD

Explanation:

Computer Aided Design, CAD, is basically for design. It involves the use of a computer to assist in the process of designing a part, circuit, building, etc.

It is also for drafting, here it makes use of a computer to assist in the process of communicating a technical drawing.

CAD has a couple of models in which its drawings and designs are represented. namey;

Solid Modeling: This is a type of 3D CAD process in which volumes of an object are represented not just its lines and surfaces.

Wireframe Modeling: This is a 3D CAD process that represents the lines and surfaces of a design.

Additive Modeling: This is a 3D modelling method in which each component is created individually and subsequent components are created as needed. This method is represented by construction processes such as welding, gluing, mechanical fastening, joinery.

Subtractive Modeling: This is a 3D modelling method in which a design is created by removing different geometric shapes from a solid block larger than the final design. The method is can best be represented by milling, drilling, turning, grinding, and other manufacturing processes.

Susie can make use of CAD and pitch its importance to his clients.

8 0
3 years ago
You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address
ioda

Answer:

The answer is "private Ip addresses were not be accessed over the Network".

Explanation:

Private network addresses were not distributed on the web and also no data from either the network will be sent to them, it only was intended to operate inside of the home network.

  • It includes the appropriate subnet the IP addresses. This network also enables you to link to many other sites.  
  • This network will use its IP address to access the home device, but it can not interact with the network.
4 0
3 years ago
Which statement will remove 5:'softball' from the dictionary?
dimaraw [331]

Answer:

sports.pop(5)

Explanation:

edg 2020

4 0
3 years ago
Read 2 more answers
What are the similarities and differences between the binary and decimal systems?
maks197457 [2]

Answer:

A binary system is a system that functions on zeros and ones (0's and 1's).

A decimal system is an Arabic numeric system that has 10 as its base and uses a dot which is also called a decimal point to show fractions.

Differences

  • A decimal uses ten different digits which is 0-9 while a binary system uses just two digits 0 and 1
  • Decimal system was historically a Hindu-Arabic system while the binary system is just an Arabic system

Similarities

  • They are capable of performing arithmetic operations
  • They both can be represented in decimal form

5 0
3 years ago
Summarize why understanding the differences between surface culture and deep culture may inform your knowledge, skills, and prof
lorasvet [3.4K]

Answer: By understanding the basic cultural values of the individual such as looks and talk. Also understanding the core values of the individual such as attitude, beliefs and religion. It would improve the behavior in your professional and cultural relationship with individuals in your workplace.

Explanation:

8 0
3 years ago
Other questions:
  • When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo
    11·1 answer
  • When you catch an Exception object, you can call ____ to display a list of methods in the call stack so you can determine the lo
    6·1 answer
  • Place the steps in order to link and place text into the document outline, effectively creating a master document.
    8·1 answer
  • Light is a key formal element that film artists and technicians carefully manipulate to create mood, reveal character, and conve
    15·1 answer
  • And then what happened,Paul Revere rhyme
    14·2 answers
  • _____moves the head to proper track
    13·2 answers
  • When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
    8·1 answer
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • I need a solution for this problem asap.
    7·1 answer
  • A(n) ____________________ key is a key that is not reused, but rather is only used once, thus improving security by reducing the
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!